Security Affairs

Experts spotted five malicious Google Chrome extensions used by 1.4M users

Researchers spotted 5 malicious Google Chrome extensions used to track users' browsing activity and profit of retail affiliate programs. McAfee…

3 years ago

China-linked APT40 used ScanBox Framework in a long-running espionage campaign

Experts uncovered a cyber espionage campaign conducted by a China-linked APT group and aimed at several entities in the South…

3 years ago

Russian streaming platform Start discloses a data breach impacting 7.5M users

The Russian subscription-based streaming service Start discloses a data breach affecting 7.5 million users. The Russian media streaming platform START…

3 years ago

A new Google bug bounty program now covers Open Source projects

Google this week launched a new bug bounty program that covers the open source projects of the IT giant. Google…

3 years ago

Three campaigns delivering multiple malware, including ModernLoader and XMRig miner

Researchers spotted three campaigns delivering multiple malware, including ModernLoader, RedLine Stealer, and cryptocurrency miners Cisco Talos researchers observed three separate,…

3 years ago

A study on malicious plugins in WordPress Marketplaces

A group of researchers from the Georgia Institute of Technology discovered malicious plugins on tens of thousands of WordPress sites.…

3 years ago

World’s largest distributors of books Baker & Taylor hit by ransomware

Baker & Taylor, one of the world's largest distributors of books, revealed that it was hit by a ransomware attack.…

3 years ago

Crooks are increasingly targeting DeFi platforms to steal cryptocurrency

The U.S. FBI warns investors that crooks are increasingly exploiting security issues in Decentralized Finance (DeFi) platforms to steal cryptocurrency.…

3 years ago

US FTC sued US data broker Kochava for selling sensitive and geolocation data

The U.S. FTC sued US data broker Kochava for selling sensitive and precise geolocation data collected from hundreds of millions…

3 years ago

Twilio breach let attackers access Authy two-factor accounts of 93 users

Threat actors behind the Twilio hack also gained access to the accounts of 93 individual users of its Authy two-factor…

3 years ago

This website uses cookies.